{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:43:47.447","vulnerabilities":[{"cve":{"id":"CVE-2020-15732","sourceIdentifier":"cve-requests@bitdefender.com","published":"2021-06-22T15:15:08.377","lastModified":"2024-11-21T05:06:06.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Certificate Validation vulnerability in the Online Threat Prevention module as used in Bitdefender Total Security allows an attacker to potentially bypass HTTP Strict Transport Security (HSTS) checks. This issue affects: Bitdefender Total Security versions prior to 25.0.7.29. Bitdefender Internet Security versions prior to 25.0.7.29. Bitdefender Antivirus Plus versions prior to 25.0.7.29."},{"lang":"es","value":"Una vulnerabilidad de Comprobación Inapropiada de Certificados en el módulo Online Threat Prevention tal y como es usado en Bitdefender Total Security, permite a un atacante omitir potencialmente las comprobaciones de HTTP Strict Transport Security (HSTS). Este problema afecta a: Bitdefender Total Security versiones anteriores a 25.0.7.29. Bitdefender Internet Security versiones anteriores a 25.0.7.29. Bitdefender Antivirus Plus versiones anteriores a 25.0.7.29"}],"metrics":{"cvssMetricV31":[{"source":"cve-requests@bitdefender.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cve-requests@bitdefender.com","type":"Secondary","description":[{"lang":"en","value":"CWE-295"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bitdefender:antivirus_plus:*:*:*:*:*:*:*:*","versionEndExcluding":"25.0.7.29","matchCriteriaId":"09CC0E30-67CA-4AAC-AA9C-4B2BE7BE4EA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:bitdefender:internet_security:*:*:*:*:*:*:*:*","versionEndExcluding":"25.0.7.29","matchCriteriaId":"36B7E3E3-65F2-4709-A013-4EA319C136ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*","versionEndExcluding":"25.0.7.29","matchCriteriaId":"04C8DA8B-1E5D-46D1-9617-5DBDE1DAA62A"}]}]}],"references":[{"url":"https://www.bitdefender.com/support/security-advisories/improper-certificate-validation-bitdefender-total-security-va-8957","source":"cve-requests@bitdefender.com","tags":["Vendor Advisory"]},{"url":"https://www.bitdefender.com/support/security-advisories/improper-certificate-validation-bitdefender-total-security-va-8957","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}